Certified Threat Hunting Professional eCTHPv2 Review

  1. Introduction to threat hunting: comprises of introduction threat hunting, threat hunting terminologies, threat intelligence and threat hunting hypothesis. Here I learnt how to use AlienVault Open Threat exchange, FireEye, Inc. IoC Editor, Yara rules and Redline
  2. Threat Hunting Network & Network Analysis: here I learn a lot of network analysis and hunting using Wireshark, network miner, RSA Netwitness and hunting web shells using Loki and log parser studio.
  3. Hunting Endpoint: This is perhaps my favorite part of the package as I learnt endpoint hunting using Redline, malware & memory analysis using volatility, SIEM using Splunk and ELK.

--

--

I am a Cyber Threat Intelligence Analyst, Cybersecurity Trainer and Cybersecurity Researcher

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Olajumoke Oloyede

Olajumoke Oloyede

72 Followers

I am a Cyber Threat Intelligence Analyst, Cybersecurity Trainer and Cybersecurity Researcher